Protocol composition logic (PCL) A Datta, A Derek, JC Mitchell, A Roy Electronic Notes in Theoretical Computer Science 172, 311-358, 2007 | 295 | 2007 |
A derivation system and compositional logic for security protocols A Datta, A Derek, JC Mitchell, D Pavlovic Journal of Computer Security 13 (3), 423-482, 2005 | 197 | 2005 |
A modular correctness proof of IEEE 802.11 i and TLS C He, M Sundararajan, A Datta, A Derek, JC Mitchell Proceedings of the 12th ACM conference on Computer and communications …, 2005 | 178 | 2005 |
Probabilistic polynomial-time semantics for a protocol security logic A Datta, A Derek, JC Mitchell, V Shmatikov, M Turuani International Colloquium on Automata, Languages, and Programming, 16-29, 2005 | 141 | 2005 |
A derivation system for security protocols and its logical formalization A Datta, A Derek, JC Mitchell, D Pavlovic Computer Security Foundations Workshop, 2003. Proceedings. 16th IEEE, 109-125, 2003 | 107 | 2003 |
Secure protocol composition A Datta, A Derek, JC Mitchell, D Pavlovic Proceedings of the 2003 ACM workshop on Formal methods in security …, 2003 | 106 | 2003 |
Computationally sound compositional logic for key exchange protocols A Datta, A Derek, JC Mitchell, B Warinschi Computer Security Foundations Workshop, 2006. 19th IEEE, 14 pp.-334, 2006 | 102* | 2006 |
Compositional analysis of contract-signing protocols M Backes, A Datta, A Derek, JC Mitchell, M Turuani Theoretical Computer Science 367 (1-2), 33-56, 2006 | 62 | 2006 |
Games and the impossibility of realizable ideal functionality A Datta, A Derek, J Mitchell, A Ramanathan, A Scedrov Theory of Cryptography, 360-379, 2006 | 58* | 2006 |
Abstraction and refinement in protocol derivation A Datta, A Derek, JC Mitchell, D Pavlovic Computer Security Foundations Workshop, 2004. Proceedings. 17th IEEE, 30-45, 2004 | 51 | 2004 |
Secrecy analysis in protocol composition logic A Roy, A Datta, A Derek, JC Mitchell, JP Seifert Annual Asian Computing Science Conference, 197-213, 2006 | 48 | 2006 |
HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens I Sluganovic, M Serbec, A Derek, I Martinovic Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 34 | 2017 |
Inductive proofs of computational secrecy A Roy, A Datta, A Derek, J Mitchell Computer Security–ESORICS 2007, 219-234, 2007 | 28 | 2007 |
Secrecy analysis in protocol composition logic PC Logic Formal Logical Methods for System Security and Correctness 14, 199, 2008 | 20* | 2008 |
Inductive trace properties for computational security A Roy, A Datta, A Derek, JC Mitchell Journal of Computer Security 18 (6), 1035-1073, 2010 | 10 | 2010 |
C3PO: cipher construction with cartesian genetic programming S Picek, K Knezevic, D Jakobovic, A Derek Proceedings of the Genetic and Evolutionary Computation Conference Companion …, 2019 | 7 | 2019 |
Formal analysis of security protocols: protocol composition logic A Derek Stanford University, 2007 | 7 | 2007 |
Tap-Pair: Using Spatial Secrets for Single-Tap Device Pairing of Augmented Reality Headsets I Sluganovic, M Liskij, A Derek, I Martinovic Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020 | 4 | 2020 |
Conditional Observational Equivalence and Off-line Guessing Attacks in Multiset Rewriting P Paradžik, A Derek 2022 IEEE 35th Computer Security Foundations Symposium (CSF), 1-16, 2022 | 1 | 2022 |
Automatically generating models of IT systems I Kovačević, S Groš, A Derek IEEE Access, 2022 | 1 | 2022 |